CloudCheckr ingests both the configuration and logs from CloudTrail to provide visibility and actionable information about your resources in Amazon Web Services. Using CloudCheckr you can analyze, search, understand, and alert on changes to resources and API activity recorded by CloudTrail. CloudCheckr can be configured to start ingesting your CloudTrail in minutes and includes a free 2 week trial.

Within CloudCheckr, you setup a read-only IAM user for AWS that is used to automatically collect your CloudTrail configuration, verify it has been setup correctly, alert on a misconfigured Trail, and apply best practice policies. After verifying your configuration, CloudCheckr automatically finds and ingests your CloudTrail logs into a format that can be searched and analyzed. Again, our best practice engine pours through your logs finding security events and highlighting abnormal activity. Once setup, CloudCheckr continuously looks through the logs for new events and emails you when something abnormal occurs.

CloudCheckr can be used to filter and find specific actions in your logs. Using its CloudTrail search engine, you can visualize the activities of a specific user, a specific resource, home in on failed activities, specific actions, or specific IP Addresses.&nbsp;

Because CloudCheckr is designed from the ground up specifically for CloudTrail, it provides you a deep understanding of AWS events and is able to tie back to AWS resources, IAM users.